Topic: Applied cybersecurity
Digital Identity: The what, why and how
Many security breaches occur because of issues in digital identity processes, tools and reach. Read Accenture's tips on how to get digital identity right.
There's no reason to risk flying blind in the cloud
Accenture's Mark Rauchwarter talks about Cloud Security Posture Management (CSPM), a comprehensive and automated approach to multi-cloud environment. Read more.
Secure telco cloud: How to help make your cloud journey safe from the start
Accenture's Oliver Neuberger explains how to deploy the cloud to the telcos securely to get better business outcomes by reducing risks. Read more.
Shifting left in security? The numbers are convincing
Accenture discusses how shift-left security can help organizations keep workloads secure in the age of cloud-based applications and infrastructures. Read more.
Why I think security can make the most of cloud’s silver lining
Accenture Cloud offers opportunities to modernize services and transform operations but security risk remains the greatest barrier to cloud adoption. Read more.
How to secure finance on the front line
Accenture's Future Cyber Threats report shows how we take a deep dive into the key cyber threat themes that are facing financial services industry. Read more.
In business, and especially cybersecurity, confidence is good
Onapsis helps Accenture embed robust security for its global clients using a SAP vulnerability management technical solution. Read more.
Electric utilities need freedom to adopt cloud and virtualization technologies
Accenture Cloud offers electric utilities less cost and less risk, along with more innovation, resilience, and security. Read more.
Why emerging tech can be seen as a risky business
Accenture's blog discusses how companies are moving full speed to adopt new technologies but underestimating the potential impact of cyber risks. Read more.
Communication is the answer to cyberthreats in a crisis
COVID-19 pandemic is first and foremost a health and humanitarian crisis, but there’s a massive business impact. Read our report to know how to prepare.
Subscribe to Security Blog Subscribe to Security Blog